{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:08:38Z","timestamp":1742915318239,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819984619"},{"type":"electronic","value":"9789819984626"}],"license":[{"start":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T00:00:00Z","timestamp":1703548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T00:00:00Z","timestamp":1703548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8462-6_14","type":"book-chapter","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:02:17Z","timestamp":1703530937000},"page":"163-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CE$$^2$$: A Copula Entropic Mutual Information Estimator for\u00a0Enhancing Adversarial Robustness"],"prefix":"10.1007","author":[{"given":"Lin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Cong","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiao-Jun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,26]]},"reference":[{"key":"14_CR1","unstructured":"Belghazi, M.I., et al.: Mutual information neural estimation. In: ICML. Proceedings of Machine Learning Research, vol. 80, pp. 530\u2013539. PMLR (2018)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy, pp. 39\u201357. IEEE Computer Society (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"14_CR3","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: ICML. Proceedings of Machine Learning Research, vol. 119, pp. 2206\u20132216. PMLR (2020)"},{"key":"14_CR4","unstructured":"Ding, G.W., Lui, K.Y.C., Jin, X., Wang, L., Huang, R.: On the sensitivity of adversarial robustness to input data distributions. In: ICLR (Poster). OpenReview.net (2019)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TIP.2019.2948472","volume":"29","author":"Y Duan","year":"2020","unstructured":"Duan, Y., Lu, J., Zheng, W., Zhou, J.: Deep adversarial metric learning. IEEE Trans. Image Process. 29, 2037\u20132051 (2020)","journal-title":"IEEE Trans. Image Process."},{"key":"14_CR6","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (Poster) (2015)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Hu, C., Li, Y., Feng, Z., Wu, X.: Attention-guided evolutionary attack with elastic-net regularization on face recognition. Pattern Recogn. 109760 (2023)","DOI":"10.1016\/j.patcog.2023.109760"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"2472","DOI":"10.1109\/LSP.2022.3226118","volume":"29","author":"C Hu","year":"2022","unstructured":"Hu, C., Xu, H.Q., Wu, X.J.: Substitute meta-learning for black-box adversarial attack. IEEE Sig. Process. Lett. 29, 2472\u20132476 (2022). https:\/\/doi.org\/10.1109\/LSP.2022.3226118","journal-title":"IEEE Sig. Process. Lett."},{"key":"14_CR9","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Adversarial examples are not bugs, they are features. In: NeurIPS, pp. 125\u2013136 (2019)"},{"key":"14_CR10","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: NIPS, pp. 1106\u20131114 (2012)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1109\/TIP.2020.2975984","volume":"29","author":"H Li","year":"2020","unstructured":"Li, H., Wu, X., Kittler, J.: MDLatLRR: a novel decomposition method for infrared and visible image fusion. IEEE Trans. Image Process. 29, 4733\u20134746 (2020)","journal-title":"IEEE Trans. Image Process."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Li, X., Wang, W., Hu, X., Yang, J.: Selective kernel networks. In: CVPR, pp. 510\u2013519. Computer Vision Foundation\/IEEE (2019)","DOI":"10.1109\/CVPR.2019.00060"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Liao, F., Liang, M., Dong, Y., Pang, T., Hu, X., Zhu, J.: Defense against adversarial attacks using high-level representation guided denoiser. In: CVPR, pp. 1778\u20131787. Computer Vision Foundation\/IEEE Computer Society (2018)","DOI":"10.1109\/CVPR.2018.00191"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Lin, S., et al.: Towards optimal structured CNN pruning via generative adversarial learning. In: CVPR, pp. 2790\u20132799. Computer Vision Foundation\/IEEE (2019)","DOI":"10.1109\/CVPR.2019.00290"},{"issue":"3","key":"14_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/2.36","volume":"21","author":"R Linsker","year":"1988","unstructured":"Linsker, R.: Self-organization in a perceptual network. Computer 21(3), 105\u2013117 (1988)","journal-title":"Computer"},{"key":"14_CR16","unstructured":"Ma, J., Sun, Z.: Mutual information is copula entropy. CoRR abs\/0808.0845 (2008)"},{"key":"14_CR17","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (Poster). OpenReview.net (2018)"},{"key":"14_CR18","unstructured":"McAllester, D., Stratos, K.: Formal limitations on the measurement of mutual information. In: AISTATS. Proceedings of Machine Learning Research, vol. 108, pp. 875\u2013884. PMLR (2020)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Naseer, M., Khan, S.H., Hayat, M., Khan, F.S., Porikli, F.: A self-supervised approach for adversarial robustness. In: CVPR, pp. 259\u2013268. Computer Vision Foundation\/IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00034"},{"issue":"11","key":"14_CR20","doi-asserted-by":"publisher","first-page":"5847","DOI":"10.1109\/TIT.2010.2068870","volume":"56","author":"X Nguyen","year":"2010","unstructured":"Nguyen, X., Wainwright, M.J., Jordan, M.I.: Estimating divergence functionals and the likelihood ratio by convex risk minimization. IEEE Trans. Inf. Theory 56(11), 5847\u20135861 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Noshad, M., Zeng, Y., III, A.O.H.: Scalable mutual information estimation using dependence graphs. In: ICASSP, pp. 2962\u20132966. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683351"},{"key":"14_CR22","unstructured":"van den Oord, A., Li, Y., Vinyals, O.: Representation learning with contrastive predictive coding. CoRR abs\/1807.03748 (2018)"},{"issue":"6","key":"14_CR23","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1162\/089976603321780272","volume":"15","author":"L Paninski","year":"2003","unstructured":"Paninski, L.: Estimation of entropy and mutual information. Neural Comput. 15(6), 1191\u20131253 (2003)","journal-title":"Neural Comput."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: EuroS &P, pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"14_CR25","unstructured":"Poole, B., Ozair, S., van den Oord, A., Alemi, A.A., Tucker, G.: On variational bounds of mutual information. In: ICML. Proceedings of Machine Learning Research, vol. 97, pp. 5171\u20135180. PMLR (2019)"},{"issue":"3","key":"14_CR26","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1080\/00401706.2000.10486066","volume":"42","author":"B Ravens","year":"2000","unstructured":"Ravens, B.: An introduction to copulas. Technometrics 42(3), 317 (2000)","journal-title":"Technometrics"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Rony, J., Hafemann, L.G., Oliveira, L.S., Ayed, I.B., Sabourin, R., Granger, E.: Decoupling direction and norm for efficient gradient-based L2 adversarial attacks and defenses. In: CVPR, pp. 4322\u20134330. Computer Vision Foundation\/IEEE (2019)","DOI":"10.1109\/CVPR.2019.00445"},{"key":"14_CR28","unstructured":"Rubenstein, P.K., Bousquet, O., Djolonga, J., Riquelme, C., Tolstikhin, I.O.: Practical and consistent estimation of f-divergences. In: NeurIPS, pp. 4072\u20134082 (2019)"},{"key":"14_CR29","unstructured":"Shi, Y., Liao, B., Chen, G., Liu, Y., Cheng, M., Feng, J.: Understanding adversarial behavior of DNNs by disentangling non-robust and robust components in performance metric. CoRR abs\/1906.02494 (2019)"},{"key":"14_CR30","unstructured":"Sklar, M.J.: Fonctions de repartition a n dimensions et Leurs Marges (1959)"},{"key":"14_CR31","unstructured":"Song, J., Ermon, S.: Understanding the limitations of variational mutual information estimators. In: ICLR. OpenReview.net (2020)"},{"key":"14_CR32","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.neunet.2019.12.024","volume":"124","author":"C Tian","year":"2020","unstructured":"Tian, C., Xu, Y., Li, Z., Zuo, W., Fei, L., Liu, H.: Attention-guided CNN for image denoising. Neural Netw. 124, 117\u2013129 (2020)","journal-title":"Neural Netw."},{"key":"14_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1007\/978-3-031-18907-4_52","volume-title":"Pattern Recognition and Computer Vision - PRCV 2022","author":"J Tong","year":"2022","unstructured":"Tong, J., Chen, T., Wang, Q., Yao, Y.: Few-shot object detection via understanding convolution and attention. In: Yu, S., et al. (eds.) PRCV 2022. LNCS, vol. 13534, pp. 674\u2013687. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-18907-4_52"},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.neucom.2020.10.081","volume":"429","author":"M Wang","year":"2021","unstructured":"Wang, M., Deng, W.: Deep face recognition: a survey. Neurocomputing 429, 215\u2013244 (2021)","journal-title":"Neurocomputing"},{"key":"14_CR35","unstructured":"Wang, Y., Zou, D., Yi, J., Bailey, J., Ma, X., Gu, Q.: Improving adversarial robustness requires revisiting misclassified examples. In: ICLR. OpenReview.net (2020)"},{"key":"14_CR36","unstructured":"Wu, K., Wang, A.H., Yu, Y.: Stronger and faster Wasserstein adversarial attacks. In: ICML. Proceedings of Machine Learning Research, vol. 119, pp. 10377\u201310387. PMLR (2020)"},{"key":"14_CR37","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., Ghaoui, L.E., Jordan, M.I.: Theoretically principled trade-off between robustness and accuracy. In: ICML. Proceedings of Machine Learning Research, vol. 97, pp. 7472\u20137482. PMLR (2019)"},{"key":"14_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-031-18907-4_16","volume-title":"Pattern Recognition and Computer Vision - PRCV 2022","author":"W Zhang","year":"2022","unstructured":"Zhang, W., Gou, Y., Jiang, Y., Zhang, Y.: Adversarial VAE with normalizing flows for multi-dimensional classification. In: Yu, S., et al. (eds.) PRCV 2022. LNCS, vol. 13534, pp. 205\u2013219. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-18907-4_16"},{"issue":"11","key":"14_CR39","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1109\/TNNLS.2018.2876865","volume":"30","author":"Z Zhao","year":"2019","unstructured":"Zhao, Z., Zheng, P., Xu, S., Wu, X.: Object detection with deep learning: a review. IEEE Trans. Neural Netw. Learn. Syst. 30(11), 3212\u20133232 (2019)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"14_CR40","unstructured":"Zhou, D., et al.: Improving adversarial robustness via mutual information estimation. In: ICML. Proceedings of Machine Learning Research, vol. 162, pp. 27338\u201327352. PMLR (2022)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8462-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:04:11Z","timestamp":1703531051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8462-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,26]]},"ISBN":["9789819984619","9789819984626"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8462-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,26]]},"assertion":[{"value":"26 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/prcv2023.xmu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1420","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"532","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,78","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,69","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}